Cyber
Deloitte Cyber understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful insights to help our clients navigate the ever-changing threat landscape. Through powerful insights and managed services that simplify complexity, we enable businesses to operate with resilience, grow with confidence, and proactively manage to secure achievements.
Cyber Defense & Resilience
Cyber Defense & Resilience teams assist clients in defending against advanced threats by transforming security operations, and by monitoring technology, data analytics, and threat intelligence. They help manage and protect dynamic attack surfaces and provide rapid crisis and cyber incident response, thereby ensuring that clients can be ready for, respond to, and recover from business disruptions. Examples of work include Operational Resilience, Crisis & Incident Response, and Security Operations Center Transformation.
Work you’ll do
As a Consultant, you will be supporting the team/clients with their Cyber needs specifically helping them address Cloud Security concerns and navigate the journey to the Cloud on the Microsoft Sentinel Platform. This will include:
- Experience in architecting, designing, and implementing the deployment of Cloud Services (Azure, AWS, GCP), Microsoft Sentinel, EDR, and XDR solutions to enhance clients' security posture.
- Experience in forming KQL queries and functions for complex detection and monitoring requirements.
- Expertise in building custom analytical rules, tuning of analytical rules, building automation through Azure logic apps, management of entire product feature, end to end configuration.
- Ability to create clear and concise reports on security data and threats, including data visualization techniques.
- Must have strong knowledge in MITRE attack framework and expertise in developing analytical rules and custom dashboards/workbooks across framework.
- Assisting clients with migrating from existing SIEM solution (other platforms) to Microsoft Sentinel.
- Expertise in log management, retentions, maintenance of logs at low cost, performing access management, developing new custom dashboard based on different requirements.
- Must have proven record of implementing Sentinel advanced features, efficient log collection mechanisms, deployment and maintenance of log forwarders, and maintenance of local agents.
- Expertise in integrating data sources which are not supported by Sentinel tool OOB. Custom parser development and ability to solve technical issues in Sentinel must have requirements. Experience with third-party data brokering service is a plus.
- Experience with threat intelligence integration and UEBA (User and Entity Behavior Analytics) .
- Experience with scripting and automation tools (e.g., PowerShell, Python, Terraform) for security operations
- Provide end-to-end event analysis, incident detection, and manage escalations using documented procedures.
- Develop, implement and refine automation playbooks in Microsoft Sentinel.
- Devise and document new procedures and runbooks/playbooks as directed.
- Create cyber and threat hunting queries to enable the Intelligence team to conduct advanced investigations when required.
- Continuously improve the service by identifying and correcting issues or gaps in knowledge (analysis procedures, plays, client network models), false positive tuning, identifying and recommending new or updated tools, content, countermeasures, scripts, plug-ins, etc.
- Experience in connecting native and third-party custom/SaaS applications with SIEM.
- Understanding of basic networking protocols such as TCP/IP, DNS, HTTP
- Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
- Knowledge of Advanced Persistent Threats (APT) tactics, technics and procedures.
- Acting as a subject matter expert on cyber risk for the Microsoft Sentinel, EDR & XDR platforms.
- Preference will be given to candidates who have completed Sentinel Ninja Level 400 Training and Certification.
- Good to have strong knowledge in Microsoft Sentinel pricing, Microsoft defender products, Microsoft Cloud services and Azure Arc.
- Having knowledge and hands-on experience in Microsoft Defender XDR stack will be an added advantage.
- Should have ability to prepare and maintain policy and procedure documentations around SIEM technology, document life cycle management skill is required.
- Experienced in working with stakeholders to solve technical issues and to support and deliver complex business, security and operational requirements.
- Ability to work with vendor technical support group and driving issues towards effective and permanent closure.
Required skills
- 3+ years of experience in technical consulting, client problem solving, architecting, and designing solutions around Microsoft Sentinel, EDR & XDR platforms
- Working experience in at least one of the areas listed: 3+ years of hands-on technical experience enterprise-with Microsoft Security management services (Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint detection and response (EDR), Anti-Virus, Sandboxing, network and host-based firewalls, Threat Intelligence, Vulnerability Assessment, Penetration Testing, etc.)
- Ideally the following technical experience: 3+ years of hands-on technical experience implementing Microsoft Sentinel, EDR, XDR focused security solutions for Microsoft technologies.
Preferred skills
- Certifications such as: Microsoft new roles-based certifications (eg. SC 200), CCNP, CCNA certification a plus.
Qualification
- B.Tech/BE/BCA/MCA Degree required. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology.